Skip to content

merge to development#398

Merged
nam20485 merged 17 commits intodevelopmentfrom
nam20485
Jun 14, 2025
Merged

merge to development#398
nam20485 merged 17 commits intodevelopmentfrom
nam20485

Conversation

@nam20485
Copy link
Copy Markdown
Owner

@nam20485 nam20485 commented Jun 4, 2025

No description provided.

@nam20485 nam20485 self-assigned this Jun 4, 2025
Copilot AI review requested due to automatic review settings June 4, 2025 20:45
@github-actions
Copy link
Copy Markdown

github-actions Bot commented Jun 4, 2025

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

OpenSSF Scorecard

PackageVersionScoreDetails

Scanned Files

  • .github/workflows/codeql.yml

Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR merges feature updates into the development branch, adding explicit version overrides for vcpkg ports, a shell script for Debian-based dependency installation, and clarifying supported Linux distributions in the documentation.

  • Add a new overrides section to vcpkg.json for specific port versions
  • Introduce scripts/install-dependencies-deb.sh to automate package installs on Debian/Ubuntu
  • Update docs/README.md to include Debian and Mint alongside Ubuntu

Reviewed Changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated 4 comments.

File Description
vcpkg.json Adds overrides array with fixed versions for protobuf, libarchive, openssl, and crow
scripts/install-dependencies-deb.sh New bash script that updates apt and installs required packages
docs/README.md Updates Linux distro reference to include Ubuntu/Debian/Mint
Comments suppressed due to low confidence (1)

docs/README.md:166

  • [nitpick] For readability in documentation, list distributions with commas or conjunctions (e.g., "Ubuntu, Debian, or Mint") instead of slash-separated names.
> If you are building on a Linux system then the dependencies listed below can be installed using your package manager. For example on Ubuntu/Debian/Mint you can install them (except for vcpkg and Docker) using the following command:

Comment thread scripts/install-dependencies-deb.sh Outdated
Comment thread scripts/install-dependencies-deb.sh
Comment thread scripts/install-dependencies-deb.sh Outdated
Comment thread vcpkg.json
@github-actions
Copy link
Copy Markdown

github-actions Bot commented Jun 4, 2025

Outdated

🔍 Vulnerabilities of nam20485/odbdesign:pr-398

📦 Image Reference nam20485/odbdesign:pr-398
digestsha256:b486a2a7a1f982106a043a5d51604c2379baafb3a91adc959274614a10ffce41
vulnerabilitiescritical: 0 high: 1 medium: 5 low: 27
platformlinux/amd64
size52 MB
packages155
📦 Base Image debian:12-slim
also known as
  • 12.9-slim
  • bookworm-20250203-slim
  • bookworm-slim
digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
critical: 0 high: 1 medium: 0 low: 0 glibc 2.36-9+deb12u9 (deb)

pkg:deb/debian/glibc@2.36-9+deb12u9?os_distro=bookworm&os_name=debian&os_version=12

high : CVE--2025--0395

Affected range<2.36-9+deb12u10
Fixed version2.36-9+deb12u10
Description

When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.


critical: 0 high: 0 medium: 1 low: 1 shadow 1:4.13+dfsg1-1 (deb)

pkg:deb/debian/shadow@1:4.13+dfsg1-1?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2023--4641

Affected range<1:4.13+dfsg1-1+deb12u1
Fixed version1:4.13+dfsg1-1+deb12u1
Description

A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.


low : CVE--2023--29383

Affected range<1:4.13+dfsg1-1+deb12u1
Fixed version1:4.13+dfsg1-1+deb12u1
Description

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.


critical: 0 high: 0 medium: 1 low: 0 libtasn1-6 4.19.0-2 (deb)

pkg:deb/debian/libtasn1-6@4.19.0-2?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2024--12133

Affected range<4.19.0-2+deb12u1
Fixed version4.19.0-2+deb12u1
Description

A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.


critical: 0 high: 0 medium: 1 low: 0 gnutls28 3.7.9-2+deb12u3 (deb)

pkg:deb/debian/gnutls28@3.7.9-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2024--12243

Affected range<3.7.9-2+deb12u4
Fixed version3.7.9-2+deb12u4
Description

A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.


[experimental] - gnutls28 3.8.9-1

critical: 0 high: 0 medium: 1 low: 0 libcap2 1:2.66-4 (deb)

pkg:deb/debian/libcap2@1:2.66-4?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2025--1390

Affected range<1:2.66-4+deb12u1
Fixed version1:2.66-4+deb12u1
Description

The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.


critical: 0 high: 0 medium: 1 low: 0 systemd 252.33-1~deb12u1 (deb)

pkg:deb/debian/systemd@252.33-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2025--4598

Affected range<252.38-1~deb12u1
Fixed version252.38-1~deb12u1
Description

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.


critical: 0 high: 0 medium: 0 low: 5 p7zip 16.02+dfsg-8 (deb)

pkg:deb/debian/p7zip@16.02+dfsg-8?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2024--11612

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of streams. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-24307.


low : CVE--2023--52169

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains an out-of-bounds read that allows an attacker to read beyond the intended buffer. The bytes read beyond the intended buffer are presented as a part of a filename listed in the file system image. This has security relevance in some known web-service use cases where untrusted users can upload files and have them extracted by a server-side 7-Zip process.


low : CVE--2022--47112

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected.


  • 7zip (unimportant)
  • p7zip 16.02+transitional.1 (unimportant)
    Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
    depending on 7zip. Mark this version as fixed version.
    https://github.com/boofish/semantic-bugs/
    Negligible security impact

low : CVE--2022--47111

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

7-Zip 22.01 does not report an error for certain invalid xz files, involving block flags and reserved bits. Some later versions are unaffected.


  • 7zip (unimportant)
  • p7zip 16.02+transitional.1 (unimportant)
    Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
    depending on 7zip. Mark this version as fixed version.
    https://github.com/boofish/semantic-bugs/
    Negligible security impact

low : CVE--2022--47069

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

p7zip 16.02 was discovered to contain a heap-buffer-overflow vulnerability via the function NArchive::NZip::CInArchive::FindCd(bool) at CPP/7zip/Archive/Zip/ZipIn.cpp.


critical: 0 high: 0 medium: 0 low: 4 openldap 2.5.13+dfsg-5 (deb)

pkg:deb/debian/openldap@2.5.13+dfsg-5?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2020--15719

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
Description

libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.


low : CVE--2017--17740

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
Description

contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.


low : CVE--2017--14159

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
Description

slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.


low : CVE--2015--3276

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
Description

The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.


  • openldap (unimportant)
    Debian builds with GNUTLS, not NSS
critical: 0 high: 0 medium: 0 low: 3 krb5 1.20.1-2+deb12u3 (deb)

pkg:deb/debian/krb5@1.20.1-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2024--26461

Affected range>=1.20.1-2+deb12u3
Fixed versionNot Fixed
Description

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.


low : CVE--2024--26458

Affected range>=1.20.1-2+deb12u3
Fixed versionNot Fixed
Description

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.


low : CVE--2018--5709

Affected range>=1.20.1-2+deb12u3
Fixed versionNot Fixed
Description

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.


critical: 0 high: 0 medium: 0 low: 2 libgcrypt20 1.10.1-3 (deb)

pkg:deb/debian/libgcrypt20@1.10.1-3?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2024--2236

Affected range>=1.10.1-3
Fixed versionNot Fixed
Description

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.


low : CVE--2018--6829

Affected range>=1.10.1-3
Fixed versionNot Fixed
Description

cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.


critical: 0 high: 0 medium: 0 low: 2 curl 7.88.1-10+deb12u12 (deb)

pkg:deb/debian/curl@7.88.1-10+deb12u12?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2025--0725

Affected range>=7.88.1-10+deb12u12
Fixed versionNot Fixed
Description

When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.


low : CVE--2024--2379

Affected range>=7.88.1-10+deb12u12
Fixed versionNot Fixed
Description

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.


critical: 0 high: 0 medium: 0 low: 2 coreutils 9.1-1 (deb)

pkg:deb/debian/coreutils@9.1-1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2025--5278

Affected range>=9.1-1
Fixed versionNot Fixed
Description

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.


low : CVE--2017--18018

Affected range>=9.1-1
Fixed versionNot Fixed
Description

In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.


critical: 0 high: 0 medium: 0 low: 1 util-linux 2.38.1-5+deb12u3 (deb)

pkg:deb/debian/util-linux@2.38.1-5+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2022--0563

Affected range>=2.38.1-5+deb12u3
Fixed versionNot Fixed
Description

A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.


critical: 0 high: 0 medium: 0 low: 1 perl 5.36.0-7+deb12u1 (deb)

pkg:deb/debian/perl@5.36.0-7+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2024--56406

Affected range<5.36.0-7+deb12u2
Fixed version5.36.0-7+deb12u2
Description

A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the tr operator, S_do_trans_invmap can overflow the destination pointer d.    $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.


critical: 0 high: 0 medium: 0 low: 1 gnupg2 2.2.40-1.1 (deb)

pkg:deb/debian/gnupg2@2.2.40-1.1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2022--3219

Affected range>=2.2.40-1.1
Fixed versionNot Fixed
Description

GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.


critical: 0 high: 0 medium: 0 low: 1 gcc-12 12.2.0-14 (deb)

pkg:deb/debian/gcc-12@12.2.0-14?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2023--4039

Affected range<12.2.0-14+deb12u1
Fixed version12.2.0-14+deb12u1
Description

DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.


critical: 0 high: 0 medium: 0 low: 1 xz-utils 5.4.1-0.2 (deb)

pkg:deb/debian/xz-utils@5.4.1-0.2?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2025--31115

Affected range<5.4.1-1
Fixed version5.4.1-1
Description

XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use the lzma_stream_decoder_mt function are affected. The bug has been fixed in XZ Utils 5.8.1, and the fix has been committed to the v5.4, v5.6, v5.8, and master branches in the xz Git repository. No new release packages will be made from the old stable branches, but a standalone patch is available that applies to all affected releases.


critical: 0 high: 0 medium: 0 low: 1 tar 1.34+dfsg-1.2+deb12u1 (deb)

pkg:deb/debian/tar@1.34+dfsg-1.2+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2005--2541

Affected range>=1.34+dfsg-1.2+deb12u1
Fixed versionNot Fixed
Description

Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.


This is intended behaviour, after all tar is an archiving tool and you
need to give -p as a command line flag

critical: 0 high: 0 medium: 0 low: 1 apt 2.6.1 (deb)

pkg:deb/debian/apt@2.6.1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2011--3374

Affected range>=2.6.1
Fixed versionNot Fixed
Description

It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.


critical: 0 high: 0 medium: 0 low: 1 openssl 3.0.16-1~deb12u1 (deb)

pkg:deb/debian/openssl@3.0.16-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2010--0928

Affected range>=3.0.11-1~deb12u2
Fixed versionNot Fixed
Description

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."


http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf
openssl/openssl#24540
Fault injection based attacks are not within OpenSSLs threat model according
to the security policy: https://www.openssl.org/policies/general/security-policy.html

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Jun 4, 2025

Outdated

Recommended fixes for image nam20485/odbdesign:pr-398

Base image is debian:12-slim

Namebookworm-20250203-slim
Digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
Vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
Pushed4 months ago
Size28 MB
Packages125
Flavordebian
OS12
Slim
The base image is also available under the supported tag(s): bookworm-slim

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.
TagDetailsPushedVulnerabilities
12-slim
Newer image for same tag
Also known as:
  • 12.11-slim
  • bookworm-slim
Benefits:
  • Same OS detected
  • Newer image for same tag
  • Tag was pushed more recently
  • Image has similar size
  • Image contains equal number of packages
  • Tag is using slim variant
Image details:
  • Size: 28 MB
  • Flavor: debian
  • OS: 12
  • Slim: ✅
2 weeks ago



Change base image

TagDetailsPushedVulnerabilities
stable-slim
Tag is preferred tag
Also known as:
  • stable-20250520-slim
Benefits:
  • Same OS detected
  • Tag is preferred tag
  • Tag was pushed more recently
  • Image has similar size
  • Image contains equal number of packages
  • Tag is using slim variant
  • stable-slim was pulled 46K times last month
Image details:
  • Size: 28 MB
  • Flavor: debian
  • OS: 12
  • Slim: ✅
2 weeks ago



12
Tag is latest
Also known as:
  • 12.11
  • bookworm
  • bookworm-20250520
  • latest
Benefits:
  • Same OS detected
  • Tag was pushed more recently
  • Tag is latest
  • Image contains equal number of packages
Image details:
  • Size: 48 MB
  • Flavor: debian
  • OS: 12
2 weeks ago



@github-actions
Copy link
Copy Markdown

github-actions Bot commented Jun 14, 2025

Outdated

🔍 Vulnerabilities of nam20485/odbdesign:pr-398

📦 Image Reference nam20485/odbdesign:pr-398
digestsha256:b3f502d8985745f2a2f0a8bb5d7f94487ad996e1c610c7e89ea94bb489b96e11
vulnerabilitiescritical: 0 high: 1 medium: 5 low: 27
platformlinux/amd64
size52 MB
packages155
📦 Base Image debian:12-slim
also known as
  • 12.9-slim
  • bookworm-20250203-slim
  • bookworm-slim
digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
critical: 0 high: 1 medium: 0 low: 0 glibc 2.36-9+deb12u9 (deb)

pkg:deb/debian/glibc@2.36-9+deb12u9?os_distro=bookworm&os_name=debian&os_version=12

high : CVE--2025--0395

Affected range<2.36-9+deb12u10
Fixed version2.36-9+deb12u10
Description

When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.


critical: 0 high: 0 medium: 1 low: 1 shadow 1:4.13+dfsg1-1 (deb)

pkg:deb/debian/shadow@1:4.13+dfsg1-1?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2023--4641

Affected range<1:4.13+dfsg1-1+deb12u1
Fixed version1:4.13+dfsg1-1+deb12u1
Description

A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.


low : CVE--2023--29383

Affected range<1:4.13+dfsg1-1+deb12u1
Fixed version1:4.13+dfsg1-1+deb12u1
Description

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.


critical: 0 high: 0 medium: 1 low: 0 systemd 252.33-1~deb12u1 (deb)

pkg:deb/debian/systemd@252.33-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2025--4598

Affected range<252.38-1~deb12u1
Fixed version252.38-1~deb12u1
Description

A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.


critical: 0 high: 0 medium: 1 low: 0 gnutls28 3.7.9-2+deb12u3 (deb)

pkg:deb/debian/gnutls28@3.7.9-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2024--12243

Affected range<3.7.9-2+deb12u4
Fixed version3.7.9-2+deb12u4
Description

A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.


[experimental] - gnutls28 3.8.9-1

critical: 0 high: 0 medium: 1 low: 0 libtasn1-6 4.19.0-2 (deb)

pkg:deb/debian/libtasn1-6@4.19.0-2?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2024--12133

Affected range<4.19.0-2+deb12u1
Fixed version4.19.0-2+deb12u1
Description

A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.


critical: 0 high: 0 medium: 1 low: 0 libcap2 1:2.66-4 (deb)

pkg:deb/debian/libcap2@1:2.66-4?os_distro=bookworm&os_name=debian&os_version=12

medium : CVE--2025--1390

Affected range<1:2.66-4+deb12u1
Fixed version1:2.66-4+deb12u1
Description

The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.


critical: 0 high: 0 medium: 0 low: 5 p7zip 16.02+dfsg-8 (deb)

pkg:deb/debian/p7zip@16.02+dfsg-8?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2024--11612

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of streams. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-24307.


low : CVE--2023--52169

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains an out-of-bounds read that allows an attacker to read beyond the intended buffer. The bytes read beyond the intended buffer are presented as a part of a filename listed in the file system image. This has security relevance in some known web-service use cases where untrusted users can upload files and have them extracted by a server-side 7-Zip process.


low : CVE--2022--47112

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected.


  • 7zip (unimportant)
  • p7zip 16.02+transitional.1 (unimportant)
    Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
    depending on 7zip. Mark this version as fixed version.
    https://github.com/boofish/semantic-bugs/
    Negligible security impact

low : CVE--2022--47111

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

7-Zip 22.01 does not report an error for certain invalid xz files, involving block flags and reserved bits. Some later versions are unaffected.


  • 7zip (unimportant)
  • p7zip 16.02+transitional.1 (unimportant)
    Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
    depending on 7zip. Mark this version as fixed version.
    https://github.com/boofish/semantic-bugs/
    Negligible security impact

low : CVE--2022--47069

Affected range>=16.02+dfsg-8
Fixed versionNot Fixed
Description

p7zip 16.02 was discovered to contain a heap-buffer-overflow vulnerability via the function NArchive::NZip::CInArchive::FindCd(bool) at CPP/7zip/Archive/Zip/ZipIn.cpp.


critical: 0 high: 0 medium: 0 low: 4 openldap 2.5.13+dfsg-5 (deb)

pkg:deb/debian/openldap@2.5.13+dfsg-5?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2020--15719

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
Description

libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.


low : CVE--2017--17740

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
Description

contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.


low : CVE--2017--14159

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
Description

slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.


low : CVE--2015--3276

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
Description

The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.


  • openldap (unimportant)
    Debian builds with GNUTLS, not NSS
critical: 0 high: 0 medium: 0 low: 3 krb5 1.20.1-2+deb12u3 (deb)

pkg:deb/debian/krb5@1.20.1-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2024--26461

Affected range>=1.20.1-2+deb12u3
Fixed versionNot Fixed
Description

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.


low : CVE--2024--26458

Affected range>=1.20.1-2+deb12u3
Fixed versionNot Fixed
Description

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.


low : CVE--2018--5709

Affected range>=1.20.1-2+deb12u3
Fixed versionNot Fixed
Description

An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.


critical: 0 high: 0 medium: 0 low: 2 libgcrypt20 1.10.1-3 (deb)

pkg:deb/debian/libgcrypt20@1.10.1-3?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2024--2236

Affected range>=1.10.1-3
Fixed versionNot Fixed
Description

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.


low : CVE--2018--6829

Affected range>=1.10.1-3
Fixed versionNot Fixed
Description

cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.


critical: 0 high: 0 medium: 0 low: 2 curl 7.88.1-10+deb12u12 (deb)

pkg:deb/debian/curl@7.88.1-10+deb12u12?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2025--0725

Affected range>=7.88.1-10+deb12u12
Fixed versionNot Fixed
Description

When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.


low : CVE--2024--2379

Affected range>=7.88.1-10+deb12u12
Fixed versionNot Fixed
Description

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.


critical: 0 high: 0 medium: 0 low: 2 coreutils 9.1-1 (deb)

pkg:deb/debian/coreutils@9.1-1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2025--5278

Affected range>=9.1-1
Fixed versionNot Fixed
Description

A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.


low : CVE--2017--18018

Affected range>=9.1-1
Fixed versionNot Fixed
Description

In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.


critical: 0 high: 0 medium: 0 low: 1 tar 1.34+dfsg-1.2+deb12u1 (deb)

pkg:deb/debian/tar@1.34+dfsg-1.2+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2005--2541

Affected range>=1.34+dfsg-1.2+deb12u1
Fixed versionNot Fixed
Description

Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.


This is intended behaviour, after all tar is an archiving tool and you
need to give -p as a command line flag

critical: 0 high: 0 medium: 0 low: 1 apt 2.6.1 (deb)

pkg:deb/debian/apt@2.6.1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2011--3374

Affected range>=2.6.1
Fixed versionNot Fixed
Description

It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.


critical: 0 high: 0 medium: 0 low: 1 xz-utils 5.4.1-0.2 (deb)

pkg:deb/debian/xz-utils@5.4.1-0.2?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2025--31115

Affected range<5.4.1-1
Fixed version5.4.1-1
Description

XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use the lzma_stream_decoder_mt function are affected. The bug has been fixed in XZ Utils 5.8.1, and the fix has been committed to the v5.4, v5.6, v5.8, and master branches in the xz Git repository. No new release packages will be made from the old stable branches, but a standalone patch is available that applies to all affected releases.


critical: 0 high: 0 medium: 0 low: 1 gcc-12 12.2.0-14 (deb)

pkg:deb/debian/gcc-12@12.2.0-14?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2023--4039

Affected range<12.2.0-14+deb12u1
Fixed version12.2.0-14+deb12u1
Description

DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.


critical: 0 high: 0 medium: 0 low: 1 util-linux 2.38.1-5+deb12u3 (deb)

pkg:deb/debian/util-linux@2.38.1-5+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2022--0563

Affected range>=2.38.1-5+deb12u3
Fixed versionNot Fixed
Description

A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.


critical: 0 high: 0 medium: 0 low: 1 openssl 3.0.16-1~deb12u1 (deb)

pkg:deb/debian/openssl@3.0.16-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2010--0928

Affected range>=3.0.11-1~deb12u2
Fixed versionNot Fixed
Description

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."


http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf
openssl/openssl#24540
Fault injection based attacks are not within OpenSSLs threat model according
to the security policy: https://www.openssl.org/policies/general/security-policy.html

critical: 0 high: 0 medium: 0 low: 1 gnupg2 2.2.40-1.1 (deb)

pkg:deb/debian/gnupg2@2.2.40-1.1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2022--3219

Affected range>=2.2.40-1.1
Fixed versionNot Fixed
Description

GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.


critical: 0 high: 0 medium: 0 low: 1 perl 5.36.0-7+deb12u1 (deb)

pkg:deb/debian/perl@5.36.0-7+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

low : CVE--2024--56406

Affected range<5.36.0-7+deb12u2
Fixed version5.36.0-7+deb12u2
Description

A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the tr operator, S_do_trans_invmap can overflow the destination pointer d.    $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.


@github-actions
Copy link
Copy Markdown

github-actions Bot commented Jun 14, 2025

Outdated

Recommended fixes for image nam20485/odbdesign:pr-398

Base image is debian:12-slim

Namebookworm-20250203-slim
Digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
Vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
Pushed4 months ago
Size28 MB
Packages125
Flavordebian
OS12
Slim
The base image is also available under the supported tag(s): bookworm-slim

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.
TagDetailsPushedVulnerabilities
12-slim
Newer image for same tag
Also known as:
    Benefits:
    • Same OS detected
    • Newer image for same tag
    • Tag was pushed more recently
    • Image has similar size
    • Image contains equal number of packages
    • Tag is using slim variant
    Image details:
    • Size: 28 MB
    • OS: 12
    3 weeks ago



    Change base image

    TagDetailsPushedVulnerabilities
    stable-slim
    Tag is preferred tag
    Also known as:
    • stable-20250610-slim
    Benefits:
    • Same OS detected
    • Tag is preferred tag
    • Tag was pushed more recently
    • Image has similar size
    • Image contains equal number of packages
    • Tag is using slim variant
    • stable-slim was pulled 46K times last month
    Image details:
    • Size: 28 MB
    • Flavor: debian
    • OS: 12
    • Slim: ✅
    4 days ago



    12.11-slim
    Image introduces 12 low vulnerabilities
    Also known as:
    • bookworm-slim
    Benefits:
    • Same OS detected
    • Tag was pushed more recently
    • Image has similar size
    • Image contains equal number of packages
    • Tag is using slim variant
    Image details:
    • Size: 28 MB
    • Flavor: debian
    • OS: 12
    • Slim: ✅
    4 days ago



    12
    Tag is latest
    Also known as:
    • bookworm
    • bookworm-20250610
    • latest
    Benefits:
    • Same OS detected
    • Tag was pushed more recently
    • Tag is latest
    • Image contains equal number of packages
    Image details:
    • Size: 48 MB
    • Flavor: debian
    • OS: 12
    4 days ago



    @github-actions
    Copy link
    Copy Markdown

    github-actions Bot commented Jun 14, 2025

    Outdated

    🔍 Vulnerabilities of nam20485/odbdesign:pr-398

    📦 Image Reference nam20485/odbdesign:pr-398
    digestsha256:fe12e1370d182e39a735f84fe82532a2c35b08fd8a3b2d030cf93509821eace9
    vulnerabilitiescritical: 0 high: 1 medium: 5 low: 27
    platformlinux/amd64
    size52 MB
    packages155
    📦 Base Image debian:12-slim
    also known as
    • 12.9-slim
    • bookworm-20250203-slim
    • bookworm-slim
    digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
    vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
    critical: 0 high: 1 medium: 0 low: 0 glibc 2.36-9+deb12u9 (deb)

    pkg:deb/debian/glibc@2.36-9+deb12u9?os_distro=bookworm&os_name=debian&os_version=12

    high : CVE--2025--0395

    Affected range<2.36-9+deb12u10
    Fixed version2.36-9+deb12u10
    Description

    When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.


    critical: 0 high: 0 medium: 1 low: 1 shadow 1:4.13+dfsg1-1 (deb)

    pkg:deb/debian/shadow@1:4.13+dfsg1-1?os_distro=bookworm&os_name=debian&os_version=12

    medium : CVE--2023--4641

    Affected range<1:4.13+dfsg1-1+deb12u1
    Fixed version1:4.13+dfsg1-1+deb12u1
    Description

    A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.


    low : CVE--2023--29383

    Affected range<1:4.13+dfsg1-1+deb12u1
    Fixed version1:4.13+dfsg1-1+deb12u1
    Description

    In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.


    critical: 0 high: 0 medium: 1 low: 0 libtasn1-6 4.19.0-2 (deb)

    pkg:deb/debian/libtasn1-6@4.19.0-2?os_distro=bookworm&os_name=debian&os_version=12

    medium : CVE--2024--12133

    Affected range<4.19.0-2+deb12u1
    Fixed version4.19.0-2+deb12u1
    Description

    A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.


    critical: 0 high: 0 medium: 1 low: 0 libcap2 1:2.66-4 (deb)

    pkg:deb/debian/libcap2@1:2.66-4?os_distro=bookworm&os_name=debian&os_version=12

    medium : CVE--2025--1390

    Affected range<1:2.66-4+deb12u1
    Fixed version1:2.66-4+deb12u1
    Description

    The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.


    critical: 0 high: 0 medium: 1 low: 0 systemd 252.33-1~deb12u1 (deb)

    pkg:deb/debian/systemd@252.33-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

    medium : CVE--2025--4598

    Affected range<252.38-1~deb12u1
    Fixed version252.38-1~deb12u1
    Description

    A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.


    critical: 0 high: 0 medium: 1 low: 0 gnutls28 3.7.9-2+deb12u3 (deb)

    pkg:deb/debian/gnutls28@3.7.9-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

    medium : CVE--2024--12243

    Affected range<3.7.9-2+deb12u4
    Fixed version3.7.9-2+deb12u4
    Description

    A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.


    [experimental] - gnutls28 3.8.9-1

    critical: 0 high: 0 medium: 0 low: 5 p7zip 16.02+dfsg-8 (deb)

    pkg:deb/debian/p7zip@16.02+dfsg-8?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2024--11612

    Affected range>=16.02+dfsg-8
    Fixed versionNot Fixed
    Description

    7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of streams. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-24307.


    low : CVE--2023--52169

    Affected range>=16.02+dfsg-8
    Fixed versionNot Fixed
    Description

    The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains an out-of-bounds read that allows an attacker to read beyond the intended buffer. The bytes read beyond the intended buffer are presented as a part of a filename listed in the file system image. This has security relevance in some known web-service use cases where untrusted users can upload files and have them extracted by a server-side 7-Zip process.


    low : CVE--2022--47112

    Affected range>=16.02+dfsg-8
    Fixed versionNot Fixed
    Description

    7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected.


    • 7zip (unimportant)
    • p7zip 16.02+transitional.1 (unimportant)
      Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
      depending on 7zip. Mark this version as fixed version.
      https://github.com/boofish/semantic-bugs/
      Negligible security impact

    low : CVE--2022--47111

    Affected range>=16.02+dfsg-8
    Fixed versionNot Fixed
    Description

    7-Zip 22.01 does not report an error for certain invalid xz files, involving block flags and reserved bits. Some later versions are unaffected.


    • 7zip (unimportant)
    • p7zip 16.02+transitional.1 (unimportant)
      Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
      depending on 7zip. Mark this version as fixed version.
      https://github.com/boofish/semantic-bugs/
      Negligible security impact

    low : CVE--2022--47069

    Affected range>=16.02+dfsg-8
    Fixed versionNot Fixed
    Description

    p7zip 16.02 was discovered to contain a heap-buffer-overflow vulnerability via the function NArchive::NZip::CInArchive::FindCd(bool) at CPP/7zip/Archive/Zip/ZipIn.cpp.


    critical: 0 high: 0 medium: 0 low: 4 openldap 2.5.13+dfsg-5 (deb)

    pkg:deb/debian/openldap@2.5.13+dfsg-5?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2020--15719

    Affected range>=2.5.13+dfsg-5
    Fixed versionNot Fixed
    Description

    libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.


    low : CVE--2017--17740

    Affected range>=2.5.13+dfsg-5
    Fixed versionNot Fixed
    Description

    contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.


    low : CVE--2017--14159

    Affected range>=2.5.13+dfsg-5
    Fixed versionNot Fixed
    Description

    slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.


    low : CVE--2015--3276

    Affected range>=2.5.13+dfsg-5
    Fixed versionNot Fixed
    Description

    The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.


    • openldap (unimportant)
      Debian builds with GNUTLS, not NSS
    critical: 0 high: 0 medium: 0 low: 3 krb5 1.20.1-2+deb12u3 (deb)

    pkg:deb/debian/krb5@1.20.1-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2024--26461

    Affected range>=1.20.1-2+deb12u3
    Fixed versionNot Fixed
    Description

    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.


    low : CVE--2024--26458

    Affected range>=1.20.1-2+deb12u3
    Fixed versionNot Fixed
    Description

    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.


    low : CVE--2018--5709

    Affected range>=1.20.1-2+deb12u3
    Fixed versionNot Fixed
    Description

    An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.


    critical: 0 high: 0 medium: 0 low: 2 curl 7.88.1-10+deb12u12 (deb)

    pkg:deb/debian/curl@7.88.1-10+deb12u12?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2025--0725

    Affected range>=7.88.1-10+deb12u12
    Fixed versionNot Fixed
    Description

    When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.


    low : CVE--2024--2379

    Affected range>=7.88.1-10+deb12u12
    Fixed versionNot Fixed
    Description

    libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.


    critical: 0 high: 0 medium: 0 low: 2 coreutils 9.1-1 (deb)

    pkg:deb/debian/coreutils@9.1-1?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2025--5278

    Affected range>=9.1-1
    Fixed versionNot Fixed
    Description

    A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.


    low : CVE--2017--18018

    Affected range>=9.1-1
    Fixed versionNot Fixed
    Description

    In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.


    critical: 0 high: 0 medium: 0 low: 2 libgcrypt20 1.10.1-3 (deb)

    pkg:deb/debian/libgcrypt20@1.10.1-3?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2024--2236

    Affected range>=1.10.1-3
    Fixed versionNot Fixed
    Description

    A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.


    low : CVE--2018--6829

    Affected range>=1.10.1-3
    Fixed versionNot Fixed
    Description

    cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.


    critical: 0 high: 0 medium: 0 low: 1 xz-utils 5.4.1-0.2 (deb)

    pkg:deb/debian/xz-utils@5.4.1-0.2?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2025--31115

    Affected range<5.4.1-1
    Fixed version5.4.1-1
    Description

    XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use the lzma_stream_decoder_mt function are affected. The bug has been fixed in XZ Utils 5.8.1, and the fix has been committed to the v5.4, v5.6, v5.8, and master branches in the xz Git repository. No new release packages will be made from the old stable branches, but a standalone patch is available that applies to all affected releases.


    critical: 0 high: 0 medium: 0 low: 1 perl 5.36.0-7+deb12u1 (deb)

    pkg:deb/debian/perl@5.36.0-7+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2024--56406

    Affected range<5.36.0-7+deb12u2
    Fixed version5.36.0-7+deb12u2
    Description

    A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the tr operator, S_do_trans_invmap can overflow the destination pointer d.    $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.


    critical: 0 high: 0 medium: 0 low: 1 util-linux 2.38.1-5+deb12u3 (deb)

    pkg:deb/debian/util-linux@2.38.1-5+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2022--0563

    Affected range>=2.38.1-5+deb12u3
    Fixed versionNot Fixed
    Description

    A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.


    critical: 0 high: 0 medium: 0 low: 1 tar 1.34+dfsg-1.2+deb12u1 (deb)

    pkg:deb/debian/tar@1.34+dfsg-1.2+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2005--2541

    Affected range>=1.34+dfsg-1.2+deb12u1
    Fixed versionNot Fixed
    Description

    Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.


    This is intended behaviour, after all tar is an archiving tool and you
    need to give -p as a command line flag

    critical: 0 high: 0 medium: 0 low: 1 apt 2.6.1 (deb)

    pkg:deb/debian/apt@2.6.1?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2011--3374

    Affected range>=2.6.1
    Fixed versionNot Fixed
    Description

    It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.


    critical: 0 high: 0 medium: 0 low: 1 gnupg2 2.2.40-1.1 (deb)

    pkg:deb/debian/gnupg2@2.2.40-1.1?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2022--3219

    Affected range>=2.2.40-1.1
    Fixed versionNot Fixed
    Description

    GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.


    critical: 0 high: 0 medium: 0 low: 1 openssl 3.0.16-1~deb12u1 (deb)

    pkg:deb/debian/openssl@3.0.16-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2010--0928

    Affected range>=3.0.11-1~deb12u2
    Fixed versionNot Fixed
    Description

    OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."


    http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf
    openssl/openssl#24540
    Fault injection based attacks are not within OpenSSLs threat model according
    to the security policy: https://www.openssl.org/policies/general/security-policy.html

    critical: 0 high: 0 medium: 0 low: 1 gcc-12 12.2.0-14 (deb)

    pkg:deb/debian/gcc-12@12.2.0-14?os_distro=bookworm&os_name=debian&os_version=12

    low : CVE--2023--4039

    Affected range<12.2.0-14+deb12u1
    Fixed version12.2.0-14+deb12u1
    Description

    DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.


    @github-actions
    Copy link
    Copy Markdown

    github-actions Bot commented Jun 14, 2025

    Outdated

    Recommended fixes for image nam20485/odbdesign:pr-398

    Base image is debian:12-slim

    Namebookworm-20250203-slim
    Digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
    Vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
    Pushed4 months ago
    Size28 MB
    Packages125
    Flavordebian
    OS12
    Slim
    The base image is also available under the supported tag(s): bookworm-slim

    Refresh base image

    Rebuild the image using a newer base image version. Updating this may result in breaking changes.
    TagDetailsPushedVulnerabilities
    12-slim
    Newer image for same tag
    Also known as:
      Benefits:
      • Same OS detected
      • Newer image for same tag
      • Tag was pushed more recently
      • Image has similar size
      • Image contains equal number of packages
      • Tag is using slim variant
      Image details:
      • Size: 28 MB
      • OS: 12
      3 weeks ago



      Change base image

      TagDetailsPushedVulnerabilities
      stable-slim
      Tag is preferred tag
      Also known as:
      • stable-20250610-slim
      Benefits:
      • Same OS detected
      • Tag is preferred tag
      • Tag was pushed more recently
      • Image has similar size
      • Image contains equal number of packages
      • Tag is using slim variant
      • stable-slim was pulled 46K times last month
      Image details:
      • Size: 28 MB
      • Flavor: debian
      • OS: 12
      • Slim: ✅
      4 days ago



      12.11-slim
      Image introduces 12 low vulnerabilities
      Also known as:
      • bookworm-slim
      Benefits:
      • Same OS detected
      • Tag was pushed more recently
      • Image has similar size
      • Image contains equal number of packages
      • Tag is using slim variant
      Image details:
      • Size: 28 MB
      • Flavor: debian
      • OS: 12
      • Slim: ✅
      4 days ago



      12
      Tag is latest
      Also known as:
      • bookworm
      • bookworm-20250610
      • latest
      Benefits:
      • Same OS detected
      • Tag was pushed more recently
      • Tag is latest
      • Image contains equal number of packages
      Image details:
      • Size: 48 MB
      • Flavor: debian
      • OS: 12
      4 days ago



      @github-actions
      Copy link
      Copy Markdown

      github-actions Bot commented Jun 14, 2025

      Outdated

      🔍 Vulnerabilities of nam20485/odbdesign:pr-398

      📦 Image Reference nam20485/odbdesign:pr-398
      digestsha256:a180a17a08dad1099fbb8c7891074a2afcfe8b46b7750fb15831b25542552464
      vulnerabilitiescritical: 0 high: 1 medium: 5 low: 27
      platformlinux/amd64
      size52 MB
      packages155
      📦 Base Image debian:12-slim
      also known as
      • 12.9-slim
      • bookworm-20250203-slim
      • bookworm-slim
      digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
      vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
      critical: 0 high: 1 medium: 0 low: 0 glibc 2.36-9+deb12u9 (deb)

      pkg:deb/debian/glibc@2.36-9+deb12u9?os_distro=bookworm&os_name=debian&os_version=12

      high : CVE--2025--0395

      Affected range<2.36-9+deb12u10
      Fixed version2.36-9+deb12u10
      Description

      When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.


      critical: 0 high: 0 medium: 1 low: 1 shadow 1:4.13+dfsg1-1 (deb)

      pkg:deb/debian/shadow@1:4.13+dfsg1-1?os_distro=bookworm&os_name=debian&os_version=12

      medium : CVE--2023--4641

      Affected range<1:4.13+dfsg1-1+deb12u1
      Fixed version1:4.13+dfsg1-1+deb12u1
      Description

      A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.


      low : CVE--2023--29383

      Affected range<1:4.13+dfsg1-1+deb12u1
      Fixed version1:4.13+dfsg1-1+deb12u1
      Description

      In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.


      critical: 0 high: 0 medium: 1 low: 0 systemd 252.33-1~deb12u1 (deb)

      pkg:deb/debian/systemd@252.33-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

      medium : CVE--2025--4598

      Affected range<252.38-1~deb12u1
      Fixed version252.38-1~deb12u1
      Description

      A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.


      critical: 0 high: 0 medium: 1 low: 0 gnutls28 3.7.9-2+deb12u3 (deb)

      pkg:deb/debian/gnutls28@3.7.9-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

      medium : CVE--2024--12243

      Affected range<3.7.9-2+deb12u4
      Fixed version3.7.9-2+deb12u4
      Description

      A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.


      [experimental] - gnutls28 3.8.9-1

      critical: 0 high: 0 medium: 1 low: 0 libtasn1-6 4.19.0-2 (deb)

      pkg:deb/debian/libtasn1-6@4.19.0-2?os_distro=bookworm&os_name=debian&os_version=12

      medium : CVE--2024--12133

      Affected range<4.19.0-2+deb12u1
      Fixed version4.19.0-2+deb12u1
      Description

      A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.


      critical: 0 high: 0 medium: 1 low: 0 libcap2 1:2.66-4 (deb)

      pkg:deb/debian/libcap2@1:2.66-4?os_distro=bookworm&os_name=debian&os_version=12

      medium : CVE--2025--1390

      Affected range<1:2.66-4+deb12u1
      Fixed version1:2.66-4+deb12u1
      Description

      The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.


      critical: 0 high: 0 medium: 0 low: 5 p7zip 16.02+dfsg-8 (deb)

      pkg:deb/debian/p7zip@16.02+dfsg-8?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2024--11612

      Affected range>=16.02+dfsg-8
      Fixed versionNot Fixed
      Description

      7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of streams. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-24307.


      low : CVE--2023--52169

      Affected range>=16.02+dfsg-8
      Fixed versionNot Fixed
      Description

      The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains an out-of-bounds read that allows an attacker to read beyond the intended buffer. The bytes read beyond the intended buffer are presented as a part of a filename listed in the file system image. This has security relevance in some known web-service use cases where untrusted users can upload files and have them extracted by a server-side 7-Zip process.


      low : CVE--2022--47112

      Affected range>=16.02+dfsg-8
      Fixed versionNot Fixed
      Description

      7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected.


      • 7zip (unimportant)
      • p7zip 16.02+transitional.1 (unimportant)
        Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
        depending on 7zip. Mark this version as fixed version.
        https://github.com/boofish/semantic-bugs/
        Negligible security impact

      low : CVE--2022--47111

      Affected range>=16.02+dfsg-8
      Fixed versionNot Fixed
      Description

      7-Zip 22.01 does not report an error for certain invalid xz files, involving block flags and reserved bits. Some later versions are unaffected.


      • 7zip (unimportant)
      • p7zip 16.02+transitional.1 (unimportant)
        Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
        depending on 7zip. Mark this version as fixed version.
        https://github.com/boofish/semantic-bugs/
        Negligible security impact

      low : CVE--2022--47069

      Affected range>=16.02+dfsg-8
      Fixed versionNot Fixed
      Description

      p7zip 16.02 was discovered to contain a heap-buffer-overflow vulnerability via the function NArchive::NZip::CInArchive::FindCd(bool) at CPP/7zip/Archive/Zip/ZipIn.cpp.


      critical: 0 high: 0 medium: 0 low: 4 openldap 2.5.13+dfsg-5 (deb)

      pkg:deb/debian/openldap@2.5.13+dfsg-5?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2020--15719

      Affected range>=2.5.13+dfsg-5
      Fixed versionNot Fixed
      Description

      libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.


      low : CVE--2017--17740

      Affected range>=2.5.13+dfsg-5
      Fixed versionNot Fixed
      Description

      contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.


      low : CVE--2017--14159

      Affected range>=2.5.13+dfsg-5
      Fixed versionNot Fixed
      Description

      slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.


      low : CVE--2015--3276

      Affected range>=2.5.13+dfsg-5
      Fixed versionNot Fixed
      Description

      The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.


      • openldap (unimportant)
        Debian builds with GNUTLS, not NSS
      critical: 0 high: 0 medium: 0 low: 3 krb5 1.20.1-2+deb12u3 (deb)

      pkg:deb/debian/krb5@1.20.1-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2024--26461

      Affected range>=1.20.1-2+deb12u3
      Fixed versionNot Fixed
      Description

      Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.


      low : CVE--2024--26458

      Affected range>=1.20.1-2+deb12u3
      Fixed versionNot Fixed
      Description

      Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.


      low : CVE--2018--5709

      Affected range>=1.20.1-2+deb12u3
      Fixed versionNot Fixed
      Description

      An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.


      critical: 0 high: 0 medium: 0 low: 2 coreutils 9.1-1 (deb)

      pkg:deb/debian/coreutils@9.1-1?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2025--5278

      Affected range>=9.1-1
      Fixed versionNot Fixed
      Description

      A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.


      low : CVE--2017--18018

      Affected range>=9.1-1
      Fixed versionNot Fixed
      Description

      In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.


      critical: 0 high: 0 medium: 0 low: 2 curl 7.88.1-10+deb12u12 (deb)

      pkg:deb/debian/curl@7.88.1-10+deb12u12?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2025--0725

      Affected range>=7.88.1-10+deb12u12
      Fixed versionNot Fixed
      Description

      When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.


      low : CVE--2024--2379

      Affected range>=7.88.1-10+deb12u12
      Fixed versionNot Fixed
      Description

      libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.


      critical: 0 high: 0 medium: 0 low: 2 libgcrypt20 1.10.1-3 (deb)

      pkg:deb/debian/libgcrypt20@1.10.1-3?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2024--2236

      Affected range>=1.10.1-3
      Fixed versionNot Fixed
      Description

      A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.


      low : CVE--2018--6829

      Affected range>=1.10.1-3
      Fixed versionNot Fixed
      Description

      cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.


      critical: 0 high: 0 medium: 0 low: 1 perl 5.36.0-7+deb12u1 (deb)

      pkg:deb/debian/perl@5.36.0-7+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2024--56406

      Affected range<5.36.0-7+deb12u2
      Fixed version5.36.0-7+deb12u2
      Description

      A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the tr operator, S_do_trans_invmap can overflow the destination pointer d.    $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.


      critical: 0 high: 0 medium: 0 low: 1 apt 2.6.1 (deb)

      pkg:deb/debian/apt@2.6.1?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2011--3374

      Affected range>=2.6.1
      Fixed versionNot Fixed
      Description

      It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.


      critical: 0 high: 0 medium: 0 low: 1 openssl 3.0.16-1~deb12u1 (deb)

      pkg:deb/debian/openssl@3.0.16-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2010--0928

      Affected range>=3.0.11-1~deb12u2
      Fixed versionNot Fixed
      Description

      OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."


      http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf
      openssl/openssl#24540
      Fault injection based attacks are not within OpenSSLs threat model according
      to the security policy: https://www.openssl.org/policies/general/security-policy.html

      critical: 0 high: 0 medium: 0 low: 1 xz-utils 5.4.1-0.2 (deb)

      pkg:deb/debian/xz-utils@5.4.1-0.2?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2025--31115

      Affected range<5.4.1-1
      Fixed version5.4.1-1
      Description

      XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use the lzma_stream_decoder_mt function are affected. The bug has been fixed in XZ Utils 5.8.1, and the fix has been committed to the v5.4, v5.6, v5.8, and master branches in the xz Git repository. No new release packages will be made from the old stable branches, but a standalone patch is available that applies to all affected releases.


      critical: 0 high: 0 medium: 0 low: 1 gcc-12 12.2.0-14 (deb)

      pkg:deb/debian/gcc-12@12.2.0-14?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2023--4039

      Affected range<12.2.0-14+deb12u1
      Fixed version12.2.0-14+deb12u1
      Description

      DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.


      critical: 0 high: 0 medium: 0 low: 1 gnupg2 2.2.40-1.1 (deb)

      pkg:deb/debian/gnupg2@2.2.40-1.1?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2022--3219

      Affected range>=2.2.40-1.1
      Fixed versionNot Fixed
      Description

      GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.


      critical: 0 high: 0 medium: 0 low: 1 util-linux 2.38.1-5+deb12u3 (deb)

      pkg:deb/debian/util-linux@2.38.1-5+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2022--0563

      Affected range>=2.38.1-5+deb12u3
      Fixed versionNot Fixed
      Description

      A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.


      critical: 0 high: 0 medium: 0 low: 1 tar 1.34+dfsg-1.2+deb12u1 (deb)

      pkg:deb/debian/tar@1.34+dfsg-1.2+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

      low : CVE--2005--2541

      Affected range>=1.34+dfsg-1.2+deb12u1
      Fixed versionNot Fixed
      Description

      Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.


      This is intended behaviour, after all tar is an archiving tool and you
      need to give -p as a command line flag

      @github-actions
      Copy link
      Copy Markdown

      github-actions Bot commented Jun 14, 2025

      Outdated

      Recommended fixes for image nam20485/odbdesign:pr-398

      Base image is debian:12-slim

      Namebookworm-20250203-slim
      Digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
      Vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
      Pushed4 months ago
      Size28 MB
      Packages125
      Flavordebian
      OS12
      Slim
      The base image is also available under the supported tag(s): bookworm-slim

      Refresh base image

      Rebuild the image using a newer base image version. Updating this may result in breaking changes.
      TagDetailsPushedVulnerabilities
      12-slim
      Newer image for same tag
      Also known as:
        Benefits:
        • Same OS detected
        • Newer image for same tag
        • Tag was pushed more recently
        • Image has similar size
        • Image contains equal number of packages
        • Tag is using slim variant
        Image details:
        • Size: 28 MB
        • OS: 12
        3 weeks ago



        Change base image

        TagDetailsPushedVulnerabilities
        stable-slim
        Tag is preferred tag
        Also known as:
        • stable-20250610-slim
        Benefits:
        • Same OS detected
        • Tag is preferred tag
        • Tag was pushed more recently
        • Image has similar size
        • Image contains equal number of packages
        • Tag is using slim variant
        • stable-slim was pulled 46K times last month
        Image details:
        • Size: 28 MB
        • Flavor: debian
        • OS: 12
        • Slim: ✅
        4 days ago



        12.11-slim
        Image introduces 12 low vulnerabilities
        Also known as:
        • bookworm-slim
        Benefits:
        • Same OS detected
        • Tag was pushed more recently
        • Image has similar size
        • Image contains equal number of packages
        • Tag is using slim variant
        Image details:
        • Size: 28 MB
        • Flavor: debian
        • OS: 12
        • Slim: ✅
        4 days ago



        12
        Tag is latest
        Also known as:
        • bookworm
        • bookworm-20250610
        • latest
        Benefits:
        • Same OS detected
        • Tag was pushed more recently
        • Tag is latest
        • Image contains equal number of packages
        Image details:
        • Size: 48 MB
        • Flavor: debian
        • OS: 12
        4 days ago



        @github-actions
        Copy link
        Copy Markdown

        github-actions Bot commented Jun 14, 2025

        Outdated

        🔍 Vulnerabilities of nam20485/odbdesign:pr-398

        📦 Image Reference nam20485/odbdesign:pr-398
        digestsha256:aded50e84bd3c93659ec7068a4bd29af26f75314b6430bee6cb060274e8d93d6
        vulnerabilitiescritical: 0 high: 1 medium: 5 low: 27
        platformlinux/amd64
        size52 MB
        packages155
        📦 Base Image debian:12-slim
        also known as
        • 12.9-slim
        • bookworm-20250203-slim
        • bookworm-slim
        digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
        vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
        critical: 0 high: 1 medium: 0 low: 0 glibc 2.36-9+deb12u9 (deb)

        pkg:deb/debian/glibc@2.36-9+deb12u9?os_distro=bookworm&os_name=debian&os_version=12

        high : CVE--2025--0395

        Affected range<2.36-9+deb12u10
        Fixed version2.36-9+deb12u10
        Description

        When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.


        critical: 0 high: 0 medium: 1 low: 1 shadow 1:4.13+dfsg1-1 (deb)

        pkg:deb/debian/shadow@1:4.13+dfsg1-1?os_distro=bookworm&os_name=debian&os_version=12

        medium : CVE--2023--4641

        Affected range<1:4.13+dfsg1-1+deb12u1
        Fixed version1:4.13+dfsg1-1+deb12u1
        Description

        A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.


        low : CVE--2023--29383

        Affected range<1:4.13+dfsg1-1+deb12u1
        Fixed version1:4.13+dfsg1-1+deb12u1
        Description

        In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.


        critical: 0 high: 0 medium: 1 low: 0 gnutls28 3.7.9-2+deb12u3 (deb)

        pkg:deb/debian/gnutls28@3.7.9-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

        medium : CVE--2024--12243

        Affected range<3.7.9-2+deb12u4
        Fixed version3.7.9-2+deb12u4
        Description

        A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.


        [experimental] - gnutls28 3.8.9-1

        critical: 0 high: 0 medium: 1 low: 0 libcap2 1:2.66-4 (deb)

        pkg:deb/debian/libcap2@1:2.66-4?os_distro=bookworm&os_name=debian&os_version=12

        medium : CVE--2025--1390

        Affected range<1:2.66-4+deb12u1
        Fixed version1:2.66-4+deb12u1
        Description

        The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.


        critical: 0 high: 0 medium: 1 low: 0 systemd 252.33-1~deb12u1 (deb)

        pkg:deb/debian/systemd@252.33-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

        medium : CVE--2025--4598

        Affected range<252.38-1~deb12u1
        Fixed version252.38-1~deb12u1
        Description

        A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.


        critical: 0 high: 0 medium: 1 low: 0 libtasn1-6 4.19.0-2 (deb)

        pkg:deb/debian/libtasn1-6@4.19.0-2?os_distro=bookworm&os_name=debian&os_version=12

        medium : CVE--2024--12133

        Affected range<4.19.0-2+deb12u1
        Fixed version4.19.0-2+deb12u1
        Description

        A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.


        critical: 0 high: 0 medium: 0 low: 5 p7zip 16.02+dfsg-8 (deb)

        pkg:deb/debian/p7zip@16.02+dfsg-8?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2024--11612

        Affected range>=16.02+dfsg-8
        Fixed versionNot Fixed
        Description

        7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of streams. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-24307.


        low : CVE--2023--52169

        Affected range>=16.02+dfsg-8
        Fixed versionNot Fixed
        Description

        The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains an out-of-bounds read that allows an attacker to read beyond the intended buffer. The bytes read beyond the intended buffer are presented as a part of a filename listed in the file system image. This has security relevance in some known web-service use cases where untrusted users can upload files and have them extracted by a server-side 7-Zip process.


        low : CVE--2022--47112

        Affected range>=16.02+dfsg-8
        Fixed versionNot Fixed
        Description

        7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected.


        • 7zip (unimportant)
        • p7zip 16.02+transitional.1 (unimportant)
          Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
          depending on 7zip. Mark this version as fixed version.
          https://github.com/boofish/semantic-bugs/
          Negligible security impact

        low : CVE--2022--47111

        Affected range>=16.02+dfsg-8
        Fixed versionNot Fixed
        Description

        7-Zip 22.01 does not report an error for certain invalid xz files, involving block flags and reserved bits. Some later versions are unaffected.


        • 7zip (unimportant)
        • p7zip 16.02+transitional.1 (unimportant)
          Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
          depending on 7zip. Mark this version as fixed version.
          https://github.com/boofish/semantic-bugs/
          Negligible security impact

        low : CVE--2022--47069

        Affected range>=16.02+dfsg-8
        Fixed versionNot Fixed
        Description

        p7zip 16.02 was discovered to contain a heap-buffer-overflow vulnerability via the function NArchive::NZip::CInArchive::FindCd(bool) at CPP/7zip/Archive/Zip/ZipIn.cpp.


        critical: 0 high: 0 medium: 0 low: 4 openldap 2.5.13+dfsg-5 (deb)

        pkg:deb/debian/openldap@2.5.13+dfsg-5?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2020--15719

        Affected range>=2.5.13+dfsg-5
        Fixed versionNot Fixed
        Description

        libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.


        low : CVE--2017--17740

        Affected range>=2.5.13+dfsg-5
        Fixed versionNot Fixed
        Description

        contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.


        low : CVE--2017--14159

        Affected range>=2.5.13+dfsg-5
        Fixed versionNot Fixed
        Description

        slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.


        low : CVE--2015--3276

        Affected range>=2.5.13+dfsg-5
        Fixed versionNot Fixed
        Description

        The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.


        • openldap (unimportant)
          Debian builds with GNUTLS, not NSS
        critical: 0 high: 0 medium: 0 low: 3 krb5 1.20.1-2+deb12u3 (deb)

        pkg:deb/debian/krb5@1.20.1-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2024--26461

        Affected range>=1.20.1-2+deb12u3
        Fixed versionNot Fixed
        Description

        Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.


        low : CVE--2024--26458

        Affected range>=1.20.1-2+deb12u3
        Fixed versionNot Fixed
        Description

        Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.


        low : CVE--2018--5709

        Affected range>=1.20.1-2+deb12u3
        Fixed versionNot Fixed
        Description

        An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.


        critical: 0 high: 0 medium: 0 low: 2 libgcrypt20 1.10.1-3 (deb)

        pkg:deb/debian/libgcrypt20@1.10.1-3?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2024--2236

        Affected range>=1.10.1-3
        Fixed versionNot Fixed
        Description

        A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.


        low : CVE--2018--6829

        Affected range>=1.10.1-3
        Fixed versionNot Fixed
        Description

        cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.


        critical: 0 high: 0 medium: 0 low: 2 coreutils 9.1-1 (deb)

        pkg:deb/debian/coreutils@9.1-1?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2025--5278

        Affected range>=9.1-1
        Fixed versionNot Fixed
        Description

        A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.


        low : CVE--2017--18018

        Affected range>=9.1-1
        Fixed versionNot Fixed
        Description

        In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.


        critical: 0 high: 0 medium: 0 low: 2 curl 7.88.1-10+deb12u12 (deb)

        pkg:deb/debian/curl@7.88.1-10+deb12u12?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2025--0725

        Affected range>=7.88.1-10+deb12u12
        Fixed versionNot Fixed
        Description

        When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.


        low : CVE--2024--2379

        Affected range>=7.88.1-10+deb12u12
        Fixed versionNot Fixed
        Description

        libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.


        critical: 0 high: 0 medium: 0 low: 1 tar 1.34+dfsg-1.2+deb12u1 (deb)

        pkg:deb/debian/tar@1.34+dfsg-1.2+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2005--2541

        Affected range>=1.34+dfsg-1.2+deb12u1
        Fixed versionNot Fixed
        Description

        Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.


        This is intended behaviour, after all tar is an archiving tool and you
        need to give -p as a command line flag

        critical: 0 high: 0 medium: 0 low: 1 xz-utils 5.4.1-0.2 (deb)

        pkg:deb/debian/xz-utils@5.4.1-0.2?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2025--31115

        Affected range<5.4.1-1
        Fixed version5.4.1-1
        Description

        XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use the lzma_stream_decoder_mt function are affected. The bug has been fixed in XZ Utils 5.8.1, and the fix has been committed to the v5.4, v5.6, v5.8, and master branches in the xz Git repository. No new release packages will be made from the old stable branches, but a standalone patch is available that applies to all affected releases.


        critical: 0 high: 0 medium: 0 low: 1 perl 5.36.0-7+deb12u1 (deb)

        pkg:deb/debian/perl@5.36.0-7+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2024--56406

        Affected range<5.36.0-7+deb12u2
        Fixed version5.36.0-7+deb12u2
        Description

        A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the tr operator, S_do_trans_invmap can overflow the destination pointer d.    $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.


        critical: 0 high: 0 medium: 0 low: 1 openssl 3.0.16-1~deb12u1 (deb)

        pkg:deb/debian/openssl@3.0.16-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2010--0928

        Affected range>=3.0.11-1~deb12u2
        Fixed versionNot Fixed
        Description

        OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."


        http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf
        openssl/openssl#24540
        Fault injection based attacks are not within OpenSSLs threat model according
        to the security policy: https://www.openssl.org/policies/general/security-policy.html

        critical: 0 high: 0 medium: 0 low: 1 util-linux 2.38.1-5+deb12u3 (deb)

        pkg:deb/debian/util-linux@2.38.1-5+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2022--0563

        Affected range>=2.38.1-5+deb12u3
        Fixed versionNot Fixed
        Description

        A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.


        critical: 0 high: 0 medium: 0 low: 1 gnupg2 2.2.40-1.1 (deb)

        pkg:deb/debian/gnupg2@2.2.40-1.1?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2022--3219

        Affected range>=2.2.40-1.1
        Fixed versionNot Fixed
        Description

        GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.


        critical: 0 high: 0 medium: 0 low: 1 gcc-12 12.2.0-14 (deb)

        pkg:deb/debian/gcc-12@12.2.0-14?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2023--4039

        Affected range<12.2.0-14+deb12u1
        Fixed version12.2.0-14+deb12u1
        Description

        DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.


        critical: 0 high: 0 medium: 0 low: 1 apt 2.6.1 (deb)

        pkg:deb/debian/apt@2.6.1?os_distro=bookworm&os_name=debian&os_version=12

        low : CVE--2011--3374

        Affected range>=2.6.1
        Fixed versionNot Fixed
        Description

        It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.


        @github-actions
        Copy link
        Copy Markdown

        github-actions Bot commented Jun 14, 2025

        Outdated

        Recommended fixes for image nam20485/odbdesign:pr-398

        Base image is debian:12-slim

        Namebookworm-20250203-slim
        Digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
        Vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
        Pushed4 months ago
        Size28 MB
        Packages125
        Flavordebian
        OS12
        Slim
        The base image is also available under the supported tag(s): bookworm-slim

        Refresh base image

        Rebuild the image using a newer base image version. Updating this may result in breaking changes.
        TagDetailsPushedVulnerabilities
        12-slim
        Newer image for same tag
        Also known as:
          Benefits:
          • Same OS detected
          • Newer image for same tag
          • Tag was pushed more recently
          • Image has similar size
          • Image contains equal number of packages
          • Tag is using slim variant
          Image details:
          • Size: 28 MB
          • OS: 12
          3 weeks ago



          Change base image

          TagDetailsPushedVulnerabilities
          stable-slim
          Tag is preferred tag
          Also known as:
          • stable-20250610-slim
          Benefits:
          • Same OS detected
          • Tag is preferred tag
          • Tag was pushed more recently
          • Image has similar size
          • Image contains equal number of packages
          • Tag is using slim variant
          • stable-slim was pulled 46K times last month
          Image details:
          • Size: 28 MB
          • Flavor: debian
          • OS: 12
          • Slim: ✅
          4 days ago



          12.11-slim
          Image introduces 12 low vulnerabilities
          Also known as:
          • bookworm-slim
          Benefits:
          • Same OS detected
          • Tag was pushed more recently
          • Image has similar size
          • Image contains equal number of packages
          • Tag is using slim variant
          Image details:
          • Size: 28 MB
          • Flavor: debian
          • OS: 12
          • Slim: ✅
          4 days ago



          12
          Tag is latest
          Also known as:
          • bookworm
          • bookworm-20250610
          • latest
          Benefits:
          • Same OS detected
          • Tag was pushed more recently
          • Tag is latest
          • Image contains equal number of packages
          Image details:
          • Size: 48 MB
          • Flavor: debian
          • OS: 12
          4 days ago



          @sonarqubecloud
          Copy link
          Copy Markdown

          @github-actions
          Copy link
          Copy Markdown

          🔍 Vulnerabilities of nam20485/odbdesign:pr-398

          📦 Image Reference nam20485/odbdesign:pr-398
          digestsha256:f190d15852cd7d43822fc6067965c1d86d55b3c1c67af2020073387ac18bbd4b
          vulnerabilitiescritical: 0 high: 1 medium: 5 low: 27
          platformlinux/amd64
          size52 MB
          packages155
          📦 Base Image debian:12-slim
          also known as
          • 12.9-slim
          • bookworm-20250203-slim
          • bookworm-slim
          digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
          vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
          critical: 0 high: 1 medium: 0 low: 0 glibc 2.36-9+deb12u9 (deb)

          pkg:deb/debian/glibc@2.36-9+deb12u9?os_distro=bookworm&os_name=debian&os_version=12

          high : CVE--2025--0395

          Affected range<2.36-9+deb12u10
          Fixed version2.36-9+deb12u10
          Description

          When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.


          critical: 0 high: 0 medium: 1 low: 1 shadow 1:4.13+dfsg1-1 (deb)

          pkg:deb/debian/shadow@1:4.13+dfsg1-1?os_distro=bookworm&os_name=debian&os_version=12

          medium : CVE--2023--4641

          Affected range<1:4.13+dfsg1-1+deb12u1
          Fixed version1:4.13+dfsg1-1+deb12u1
          Description

          A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.


          low : CVE--2023--29383

          Affected range<1:4.13+dfsg1-1+deb12u1
          Fixed version1:4.13+dfsg1-1+deb12u1
          Description

          In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.


          critical: 0 high: 0 medium: 1 low: 0 systemd 252.33-1~deb12u1 (deb)

          pkg:deb/debian/systemd@252.33-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

          medium : CVE--2025--4598

          Affected range<252.38-1~deb12u1
          Fixed version252.38-1~deb12u1
          Description

          A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.


          critical: 0 high: 0 medium: 1 low: 0 libtasn1-6 4.19.0-2 (deb)

          pkg:deb/debian/libtasn1-6@4.19.0-2?os_distro=bookworm&os_name=debian&os_version=12

          medium : CVE--2024--12133

          Affected range<4.19.0-2+deb12u1
          Fixed version4.19.0-2+deb12u1
          Description

          A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.


          critical: 0 high: 0 medium: 1 low: 0 libcap2 1:2.66-4 (deb)

          pkg:deb/debian/libcap2@1:2.66-4?os_distro=bookworm&os_name=debian&os_version=12

          medium : CVE--2025--1390

          Affected range<1:2.66-4+deb12u1
          Fixed version1:2.66-4+deb12u1
          Description

          The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.


          critical: 0 high: 0 medium: 1 low: 0 gnutls28 3.7.9-2+deb12u3 (deb)

          pkg:deb/debian/gnutls28@3.7.9-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

          medium : CVE--2024--12243

          Affected range<3.7.9-2+deb12u4
          Fixed version3.7.9-2+deb12u4
          Description

          A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.


          [experimental] - gnutls28 3.8.9-1

          critical: 0 high: 0 medium: 0 low: 5 p7zip 16.02+dfsg-8 (deb)

          pkg:deb/debian/p7zip@16.02+dfsg-8?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2024--11612

          Affected range>=16.02+dfsg-8
          Fixed versionNot Fixed
          Description

          7-Zip CopyCoder Infinite Loop Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of streams. The issue results from a logic error that can lead to an infinite loop. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-24307.


          low : CVE--2023--52169

          Affected range>=16.02+dfsg-8
          Fixed versionNot Fixed
          Description

          The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains an out-of-bounds read that allows an attacker to read beyond the intended buffer. The bytes read beyond the intended buffer are presented as a part of a filename listed in the file system image. This has security relevance in some known web-service use cases where untrusted users can upload files and have them extracted by a server-side 7-Zip process.


          low : CVE--2022--47112

          Affected range>=16.02+dfsg-8
          Fixed versionNot Fixed
          Description

          7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected.


          • 7zip (unimportant)
          • p7zip 16.02+transitional.1 (unimportant)
            Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
            depending on 7zip. Mark this version as fixed version.
            https://github.com/boofish/semantic-bugs/
            Negligible security impact

          low : CVE--2022--47111

          Affected range>=16.02+dfsg-8
          Fixed versionNot Fixed
          Description

          7-Zip 22.01 does not report an error for certain invalid xz files, involving block flags and reserved bits. Some later versions are unaffected.


          • 7zip (unimportant)
          • p7zip 16.02+transitional.1 (unimportant)
            Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
            depending on 7zip. Mark this version as fixed version.
            https://github.com/boofish/semantic-bugs/
            Negligible security impact

          low : CVE--2022--47069

          Affected range>=16.02+dfsg-8
          Fixed versionNot Fixed
          Description

          p7zip 16.02 was discovered to contain a heap-buffer-overflow vulnerability via the function NArchive::NZip::CInArchive::FindCd(bool) at CPP/7zip/Archive/Zip/ZipIn.cpp.


          critical: 0 high: 0 medium: 0 low: 4 openldap 2.5.13+dfsg-5 (deb)

          pkg:deb/debian/openldap@2.5.13+dfsg-5?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2020--15719

          Affected range>=2.5.13+dfsg-5
          Fixed versionNot Fixed
          Description

          libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.


          low : CVE--2017--17740

          Affected range>=2.5.13+dfsg-5
          Fixed versionNot Fixed
          Description

          contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.


          low : CVE--2017--14159

          Affected range>=2.5.13+dfsg-5
          Fixed versionNot Fixed
          Description

          slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.


          low : CVE--2015--3276

          Affected range>=2.5.13+dfsg-5
          Fixed versionNot Fixed
          Description

          The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.


          • openldap (unimportant)
            Debian builds with GNUTLS, not NSS
          critical: 0 high: 0 medium: 0 low: 3 krb5 1.20.1-2+deb12u3 (deb)

          pkg:deb/debian/krb5@1.20.1-2+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2024--26461

          Affected range>=1.20.1-2+deb12u3
          Fixed versionNot Fixed
          Description

          Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.


          low : CVE--2024--26458

          Affected range>=1.20.1-2+deb12u3
          Fixed versionNot Fixed
          Description

          Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.


          low : CVE--2018--5709

          Affected range>=1.20.1-2+deb12u3
          Fixed versionNot Fixed
          Description

          An issue was discovered in MIT Kerberos 5 (aka krb5) through 1.16. There is a variable "dbentry->n_key_data" in kadmin/dbutil/dump.c that can store 16-bit data but unknowingly the developer has assigned a "u4" variable to it, which is for 32-bit data. An attacker can use this vulnerability to affect other artifacts of the database as we know that a Kerberos database dump file contains trusted data.


          critical: 0 high: 0 medium: 0 low: 2 curl 7.88.1-10+deb12u12 (deb)

          pkg:deb/debian/curl@7.88.1-10+deb12u12?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2025--0725

          Affected range>=7.88.1-10+deb12u12
          Fixed versionNot Fixed
          Description

          When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.


          low : CVE--2024--2379

          Affected range>=7.88.1-10+deb12u12
          Fixed versionNot Fixed
          Description

          libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.


          critical: 0 high: 0 medium: 0 low: 2 libgcrypt20 1.10.1-3 (deb)

          pkg:deb/debian/libgcrypt20@1.10.1-3?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2024--2236

          Affected range>=1.10.1-3
          Fixed versionNot Fixed
          Description

          A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.


          low : CVE--2018--6829

          Affected range>=1.10.1-3
          Fixed versionNot Fixed
          Description

          cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.


          critical: 0 high: 0 medium: 0 low: 2 coreutils 9.1-1 (deb)

          pkg:deb/debian/coreutils@9.1-1?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2025--5278

          Affected range>=9.1-1
          Fixed versionNot Fixed
          Description

          A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data.


          low : CVE--2017--18018

          Affected range>=9.1-1
          Fixed versionNot Fixed
          Description

          In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.


          critical: 0 high: 0 medium: 0 low: 1 util-linux 2.38.1-5+deb12u3 (deb)

          pkg:deb/debian/util-linux@2.38.1-5+deb12u3?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2022--0563

          Affected range>=2.38.1-5+deb12u3
          Fixed versionNot Fixed
          Description

          A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.


          critical: 0 high: 0 medium: 0 low: 1 xz-utils 5.4.1-0.2 (deb)

          pkg:deb/debian/xz-utils@5.4.1-0.2?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2025--31115

          Affected range<5.4.1-1
          Fixed version5.4.1-1
          Description

          XZ Utils provide a general-purpose data-compression library plus command-line tools. In XZ Utils 5.3.3alpha to 5.8.0, the multithreaded .xz decoder in liblzma has a bug where invalid input can at least result in a crash. The effects include heap use after free and writing to an address based on the null pointer plus an offset. Applications and libraries that use the lzma_stream_decoder_mt function are affected. The bug has been fixed in XZ Utils 5.8.1, and the fix has been committed to the v5.4, v5.6, v5.8, and master branches in the xz Git repository. No new release packages will be made from the old stable branches, but a standalone patch is available that applies to all affected releases.


          critical: 0 high: 0 medium: 0 low: 1 gnupg2 2.2.40-1.1 (deb)

          pkg:deb/debian/gnupg2@2.2.40-1.1?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2022--3219

          Affected range>=2.2.40-1.1
          Fixed versionNot Fixed
          Description

          GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.


          critical: 0 high: 0 medium: 0 low: 1 perl 5.36.0-7+deb12u1 (deb)

          pkg:deb/debian/perl@5.36.0-7+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2024--56406

          Affected range<5.36.0-7+deb12u2
          Fixed version5.36.0-7+deb12u2
          Description

          A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side of the tr operator, S_do_trans_invmap can overflow the destination pointer d.    $ perl -e '$_ = "\x{FF}" x 1000000; tr/\xFF/\x{100}/;'    Segmentation fault (core dumped) It is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.


          critical: 0 high: 0 medium: 0 low: 1 openssl 3.0.16-1~deb12u1 (deb)

          pkg:deb/debian/openssl@3.0.16-1~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2010--0928

          Affected range>=3.0.11-1~deb12u2
          Fixed versionNot Fixed
          Description

          OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."


          http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf
          openssl/openssl#24540
          Fault injection based attacks are not within OpenSSLs threat model according
          to the security policy: https://www.openssl.org/policies/general/security-policy.html

          critical: 0 high: 0 medium: 0 low: 1 apt 2.6.1 (deb)

          pkg:deb/debian/apt@2.6.1?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2011--3374

          Affected range>=2.6.1
          Fixed versionNot Fixed
          Description

          It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.


          critical: 0 high: 0 medium: 0 low: 1 gcc-12 12.2.0-14 (deb)

          pkg:deb/debian/gcc-12@12.2.0-14?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2023--4039

          Affected range<12.2.0-14+deb12u1
          Fixed version12.2.0-14+deb12u1
          Description

          DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.


          critical: 0 high: 0 medium: 0 low: 1 tar 1.34+dfsg-1.2+deb12u1 (deb)

          pkg:deb/debian/tar@1.34+dfsg-1.2+deb12u1?os_distro=bookworm&os_name=debian&os_version=12

          low : CVE--2005--2541

          Affected range>=1.34+dfsg-1.2+deb12u1
          Fixed versionNot Fixed
          Description

          Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.


          This is intended behaviour, after all tar is an archiving tool and you
          need to give -p as a command line flag

          @github-actions
          Copy link
          Copy Markdown

          Recommended fixes for image nam20485/odbdesign:pr-398

          Base image is debian:12-slim

          Namebookworm-20250203-slim
          Digestsha256:44bccdd61bf09a081b1db8c61cf49bfabf30ac7afcc970010137c0ab587b209c
          Vulnerabilitiescritical: 0 high: 1 medium: 5 low: 12
          Pushed4 months ago
          Size28 MB
          Packages125
          Flavordebian
          OS12
          Slim
          The base image is also available under the supported tag(s): bookworm-slim

          Refresh base image

          Rebuild the image using a newer base image version. Updating this may result in breaking changes.
          TagDetailsPushedVulnerabilities
          12-slim
          Newer image for same tag
          Also known as:
            Benefits:
            • Same OS detected
            • Newer image for same tag
            • Tag was pushed more recently
            • Image has similar size
            • Image contains equal number of packages
            • Tag is using slim variant
            Image details:
            • Size: 28 MB
            • OS: 12
            3 weeks ago



            Change base image

            TagDetailsPushedVulnerabilities
            stable-slim
            Tag is preferred tag
            Also known as:
            • stable-20250610-slim
            Benefits:
            • Same OS detected
            • Tag is preferred tag
            • Tag was pushed more recently
            • Image has similar size
            • Image contains equal number of packages
            • Tag is using slim variant
            • stable-slim was pulled 46K times last month
            Image details:
            • Size: 28 MB
            • Flavor: debian
            • OS: 12
            • Slim: ✅
            4 days ago



            12.11-slim
            Image introduces 12 low vulnerabilities
            Also known as:
            • bookworm-slim
            Benefits:
            • Same OS detected
            • Tag was pushed more recently
            • Image has similar size
            • Image contains equal number of packages
            • Tag is using slim variant
            Image details:
            • Size: 28 MB
            • Flavor: debian
            • OS: 12
            • Slim: ✅
            4 days ago



            12
            Tag is latest
            Also known as:
            • bookworm
            • bookworm-20250610
            • latest
            Benefits:
            • Same OS detected
            • Tag was pushed more recently
            • Tag is latest
            • Image contains equal number of packages
            Image details:
            • Size: 48 MB
            • Flavor: debian
            • OS: 12
            4 days ago



            @nam20485 nam20485 enabled auto-merge June 14, 2025 07:23
            @nam20485 nam20485 merged commit c4a9b1f into development Jun 14, 2025
            17 checks passed
            Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

            Labels

            None yet

            Projects

            None yet

            Development

            Successfully merging this pull request may close these issues.

            2 participants